Benjamin

Results: 8859



#Item
1Cryptography / Randomized algorithms / Computational complexity theory / Mathematics / Probabilistically checkable proof / Complexity classes / Interactive proof system / IP / NP / Soundness / PCP theorem / Commitment scheme

Taking proof-based verified computation a few steps closer to practicality1 Srinath Setty, Victor Vu, Nikhil Panpalia, Benjamin Braun, Andrew J. Blumberg, and Michael Walfish The University of Texas at Austin Abstract. W

Add to Reading List

Source URL: www.pepper-project.org

Language: English - Date: 2017-11-11 14:59:54
2Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
3Computing / System software / Software / Internet privacy / Computer network security / Internet censorship in China / Echo Protocol / Deep packet inspection / Internet censorship / Nmap / Transmission Control Protocol / Discard Protocol

Quack: Scalable Remote Measurement of Application-Layer Censorship Benjamin VanderSloot, Allison McDonald, Will Scott, J. Alex Halderman, and Roya Ensafi University of Michigan {benvds, amcdon, willscott, jhalderm, ensaf

Add to Reading List

Source URL: benjaminvandersloot.com

Language: English - Date: 2018-09-18 11:06:16
4Logic / Mathematical logic / Mathematics / Propositional calculus / Logical truth / Logic in computer science / Syntax / Automated theorem proving / Resolution / Frege system / Boolean satisfiability problem / First-order logic

The Potential of Interference-Based Proof Systems Marijn J.H. Heule1 and Benjamin Kiesl2 1 2 Department of Computer Science, The University of Texas at Austin

Add to Reading List

Source URL: www.cs.man.ac.uk

Language: English - Date: 2017-08-02 12:35:21
5Cryptography / Distributed computing architecture / Parallel computing / MapReduce / Certificate / IP / NP / Commitment scheme / PP / Computational complexity theory

Verifying computations with state Benjamin Braun, Ariel J. Feldman⋆ , Zuocheng Ren, Srinath Setty, Andrew J. Blumberg, and Michael Walfish The University of Texas at Austin ⋆ University of Pennsylvania Abstract When

Add to Reading List

Source URL: www.pepper-project.org

Language: English - Date: 2017-11-11 14:59:54
6Routing algorithms / Fair division / Computing / Microeconomics / Fairness measure / Max-min fairness / Scheduling / Cloud computing / System resource / Central processing unit / Resource monotonicity / Pareto efficiency

Dominant Resource Fairness: Fair Allocation of Multiple Resource Types Ali Ghodsi, Matei Zaharia, Benjamin Hindman, Andy Konwinski, Scott Shenker, Ion Stoica University of California, Berkeley {alig,matei,benh,andyk,shen

Add to Reading List

Source URL: people.eecs.berkeley.edu

Language: English - Date: 2014-02-27 02:30:26
7Cryptography / Transport Layer Security / Internet security / Public key infrastructure / Secure communication / E-commerce / Certificate authority / Server Name Indication / Certificate Transparency / StartCom / HTTPS / Public key certificate

Towards a Complete View of the Certificate Ecosystem Benjamin VanderSloot† Johanna Amann‡ Matthew Bernhard† Zakir Durumeric†‡

Add to Reading List

Source URL: benvds.com

Language: English - Date: 2018-09-18 11:06:16
8Information science / Information retrieval / Information retrieval evaluation / Natural language processing / Precision and recall / Document retrieval / Relevance / Question answering / Search engine indexing / Concept search / Temporal information retrieval

On the Retrieval of Wikipedia Articles Containing Claims on Controversial Topics Haggai Roitman, Shay Hummel, Ella Rabinovich, Benjamin Sznajder Noam Slonim, Ehud Aharoni

Add to Reading List

Source URL: gdac.uqam.ca

Language: English - Date: 2017-10-04 01:05:27
9Cryptography / Internet / Internet Standards / Computing / Public-key cryptography / Key management / Domain name system / Routing protocols / Domain Name System Security Extensions / Resource Public Key Infrastructure / DNS spoofing / BGP hijacking

Internet Kill Switches Demystified Benjamin Rothenberger ETH Zürich

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English
10World Wide Web / Digital media / Computing / Notorious markets / Alphabet Inc. / Video hosting / File sharing / Copyright infringement / Tort law / The Pirate Bay / Google Search / YouTube

Movie Pirates of the Caribbean: Exploring Illegal Streaming Cyberlockers Damilola Ibosiola† , Benjamin Steer† , Alvaro Garcia-Recuero† , Gianluca Stringhini‡ , Steve Uhlig† and Gareth Tyson† † †

Add to Reading List

Source URL: www.eecs.qmul.ac.uk

Language: English - Date: 2018-08-06 12:40:12
UPDATE